Research Article

Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping

Table 1

Attacks on ACORN v3.

Cipher roundsAttackTime complexityReference

ACORN v3647Key recovery attack[19]
647Distinguishing attackSect. 4.3
649Key recovery attack[19]
649Distinguishing attackSect. 4.3
676Distinguishing attack[17]
676Distinguishing attackSect. 4.3
704Key recovery attack[19]
704Key recovery attack[20]
704Distinguishing attackSect. 4.3
721Distinguishing attackSect. 4.3
750Key recovery attack[21]
750Key recovery attack[20]